Вы находитесь на странице: 1из 12

Q1-In the relational modes, cardinality is termed as:- Number of tuples. Q2-Relational calculus is a-Non- Procedural language.

Q3-The view of total database content is-Conceptual view. Q4-Cartesian product in relational algebra is-a Binary operator. Cartesian product in relational algebra is a binary operator.(It requires two operands. e.g., P X Q) Q5-DML is provided for -manipulation & processing of database. (Data stored in the database is processed or manipulated using data manipulation language commands as its name) Q6-AS clause is used in SQL for-Rename operation. Q7-ODBC stands for-Open Database Connectivity. Q8-Architecture of the database can be viewed as-three levels. Q9-In a relational model, relations are termed as-Tables. Q10-The database schema is written in-DDL Q11-In the architecture of a database system external level is the-view level. Q12-An entity set that does not have sufficient attributes to form a primary key is a-weak entity set. Q13-In a Hierarchical model records are organized as-Tree. Q14-In tuple relational calculus P1 _ P2 is equivalent to P1 P2. (The logical implication expression A _ B, meaning if A then B,is equivalent to A B) Q15-The language used in application programs to request data from the DBMS is referred to as the-DML Q16-A logical schema-is the entire database. Q17-Related data fields in a database are grouped to form a -data record. (A record is a collection of related fields) Q18-The database environment has all of the following components except: (A) users. (B) separate files. (C) database. (D) database administrator. Ans-A Q19-The language which has recently become the defacto standard for interfacing application programs with relational database system is- 4GL Q20-The way a particular application views the data from the database that the application uses is a-sub schema. Q21-The DBMS language component which can be embedded in a program is-DML Q22-The relational model feature is that there-is much more data independence than some other database models. Q23-Conceptual design-involves modelling independent of the DBMS. Q24-A method in which records are physically stored in a specified order according to a key field in each record is -hash. (In hash method, a hash function is performed on the key value to determine the unique physical address of the record to store or retrieve) Q25-A subschema expresses-the external view. Q23-Which one of the following statements is false? (A) The data dictionary is normally maintained by the database administrator. (B) Data elements in the database can be modified by changing the data dictionary. (C) The data dictionary contains the name and description of each data element. (D) The data dictionary is a tool used exclusively by the database administrator.Ans-B

Q24-An advantage of the database management approach is-data is integrated and can be accessed by multiple programs. Q25-Transaction processing is associated with everything below except-confirming an action or triggering a response. Q26-SET concept is used in :- Network Model Q27-Relational Algebra is-Procedural query Language Q28-Cartesian product-produces the relation that has attributes of R1 and R2 Q29-The file organization that provides very fast access to any arbitrary record of a file isHashed file Q30-Which of the following is correct: (A) a SQL query automatically eliminates duplicates. (B) SQL permits attribute names to be repeated in the same relation. (C) a SQL query will not work if there are no indexes on the relations (D) None of these Ans-D Q31-Cartesian product-produce the relation that has attributes of R1 and R2 Q32-The file organization that provides very fast access to any arbitrary record of a file is -Hashed file Q33-Which of the following is correct: (A) SQL query automatically eliminates duplicates. (B) SQL permits attribute names to be repeated in the same relation. (C) SQL query will not work if there are no indexes on the relations (D) None of these Ans-D Q34- It is better to use files than a DBMS when there are -Multiple users wish to access the data. Q35-The conceptual model is-independent of both hardware and software. Q36-Which of the following operation is used if we are interested in only certain columns of a table?projection Q37-Which of the following operations need the participating relations to be union compatible? (A) UNION (B) INTERSECTION (C) DIFFERENCE (D) All of the above Ans-D Q38-Which of the following is an advantage of view? (A) Data security (B) Derived columns (C) Hiding of complex queries (D) All of the above Ans-D Q39-The user who use easy-to-use menu are called-Nave users Q40-Which database level is closest to the users? (A) External (B) Internal (C) Physical (D) Conceptual Q41-Which are the two ways in which entities can participate in a relationship?-Total and partial Ans-A

Q42-The result of the UNION operation between R1 and R2 is a relation that includes-all the tuples of R1 and R2which have common columns Q43-Which of the following is a comparison operator in SQL? (A) = (B) LIKE (C) BETWEEN (D) All of the above Ans-D Q44-A set of possible data values is called-domain Q45-Which of the operation constitute a basic set of operations for manipulating relational data?Relational algebra Q46-Which of the following is another name for weak entity? - Child Q47-Which of the following database object does not physically exist?- view Q48-NULL is (A) the same as 0 for integer (B) the same as blank for character (C) the same as 0 for integer and blank for character (D) not a value Ans: D Q49-Which of the following is record based logical model? - Network Model Q50-A data dictionary is a special file that contains: (A) The name of all fields in all files. (B) The width of all fields in all files. (C) The data type of all fields in all files. (D) All of the above. Ans: D Q51-A file manipulation command that extracts some of the records from a file is called - SELECT Q52-The physical location of a record is determined by a mathematical formula that transforms a file key into a record location is :- B-Tree File Q53-Using Relational Algebra the query that finds customers, who have a balance of over 1000 is - Customer_name( balance >1000(Deposit)) Q54-In E-R Diagram derived attribute are represented by -Dashed ellipse Q55-Cross Product is a:- Binary Operator Q56-An instance of relational schema R (A, B, C) has distinct values of A including NULL values. Which one of the following is true?- A is not a candidate key Q57-Consider the join of a relation R with relation S. If R has m tuples and S has n tuples, then the maximum size of join is: - mn Q58-The natural join is equal to :- Combination of projection and Cartesian product Q59-Which one of the following is not true for a view: (A) View is derived from other tables.

(B) View is a virtual table. (C) View definition is permanently stored as part of database (D) View never contains derived columns. Ans-C Q60-In E-R Diagram relationship type is represented by -Diamond Q61-To delete a particular column in a relation the command used is:-Alter Q62-The ______ operator is used to compare a value to a list of literals values that have been specified.- BETWEEN Q63-A B-tree of order m has maximum of ______children m Q64-In E-R diagram generalization is represented by-Triangle Q65-_________ is a virtual table that draws its data from the result of an SQL SELECT statement - View Q66-_________ data type can store unstructured data- RAW Q67-Which two files are used during operation of the DBMS-Data dictionary and transaction log You might also like:

Important Objectives Of System Software and Operating System


1-Translator for low level programming language were termed as-Assembler 2-Analysis which determines the meaning of a statement once its grammatical structure becomes known is termed as-Semantic analysis 3-Load address for the first word of the program is called-load address origin 4-Symbolic names can be associated with-data or instruction 5-The translator which perform macro expansion is called a-Macro pre-processor 6-Shell is the exclusive feature of-UNIX 7-A program in execution is called-Process 8-Interval between the time of submission and completion of the job is called-Turnaround time 9-A scheduler which selects processes from secondary storage device is called-Medium term scheduler. 10-The scheduling in which CPU is allocated to the process with least CPU-burst time is called-Shortest job first Scheduling 11-The term page traffic describes-the movement of pages in and out of memory. 12-The turn-around time of a user job is the-total time taken to execute the job. 13-Which of the following can be used as a criterion for classification of data

structures used in language processing. A-nature of a data structure B-purpose of a data structure C-lifetime of a data structure D-All Ans-D 14-Memory utilization factor shall be computed as follows-memory in use/total memory connected. 15-Program preemption is-forced de allocation of the CPU from a program which is executing on the CPU. 16-An assembler is-machine dependant. 17-Which of the following is not a fundamental process state-(A) ready (B) terminated (C) executing (D) blocked Ans-D 18-Which of the following is true? (A) Block cipher technique is an encryption technique. (B) Steam cipher technique is an encryption technique. (C) Both (A) and (B). (D) Neither of (A) and (B). Ans-C 19-Which of the following approaches do not require knowledge of the system state? (A) deadlock detection. (B) deadlock prevention. (C) deadlock avoidance. (D) none of the above. Ans-D 20-Program generation activity aims at-Automatic generation of program 21-Which amongst the following is not an advantage of Distributed systems? (A) Reliability (B) Incremental growth (C) Resource sharing (D) None of the above Ans: (A) 22- An imperative statement- Indicates an action to be performed during execution of assembled program 23- Which of the following loader is executed when a system is first turned on or Restarted- Bootstrap loader 24- Poor response time is usually caused by-(A) Process busy (B) High I/O rates (C) High paging rates (D) Any of the above Ans-D 25- Throughput of a system is- Number of programs processed by it per unit time 26- The blocking factor of a file is- The number of logical records in one physical record 27- Which of these is a component of a process precedence sequence? (A) Process name (B) Sequence operator ; (C) Concurrency operator , (D) All of the above Ans-D

28- Which amongst the following is valid syntax of the Fork and Join Primitive? (A) Fork <label> Join <var> (C) For <var> Join <var> (B) Fork <label> Join <label> (D) Fork <var> join <var> Ans-A

29- Nested Macro calls are expanded using the- FILO rule (First in last out)

30- A parser which is a variant of top-down parsing without backtracking is- Recursive Descend. 31- The expansion of nested macro calls follows- LIFO rule 32- In a two-pass assembler, the task of the Pass II is to- synthesize the target program. 33- A linker program- links the program with other programs needed for its execution. 34- Which scheduling policy is most suitable for a time-shared operating system-RR(RoundRobin.) 35- A critical section is a program segment- where shared resources are accessed.

36- An operating system contains 3 user processes each requiring 2 units of resource R .The minimum number of units of R such that no deadlocks will ever arise is-4 37- Locality of reference implies that the page reference being made by a process- is likely to be the one of the pages used in the last few page references. 38- Which of these is not a part of Synthesis phase- Perform LC processing 39-The syntax of the assembler directive EQU is-<symbol>EQU<address space> 40-The following features are needed to implement top down parsing (A) Source string marker (B) Prediction making mechanism (C) Matching and Backtracking mechanism (D) All of the above 41-A macro definition consists of (A) A macro prototype statement (B) One or more model statements (C) Macro pre-processor statements (D) All of the above Ans-D Ans-D

42-The main reason to encrypt a file is to-Secure it for transmission 43-Which of the following is not a key piece of information, stored in single page table entry, assuming pure paging and virtual memory-A reference for the disk block that stores the page

44-A UNIX device driver is-Structured into two halves called top half and bottom half 45-The following is not a layer of IO management module-MCS (Management Control System) 46-Which amongst the following is not a valid page replacement policy?- RU policy (Recurrently used) 47-An assembly language is a-low level programming language 48-TII stands for-Table of incomplete instructions 49-An analysis, which determines the syntactic structure of the source statement, is Called-Syntax analysis 50-Action implementing instructions meaning are a actually carried out by-instruction execution
1 2 3

1-The field that contains a segment index or an internal index is called-target datum 52-A program in execution is called-process 53-Jobs which are admitted to the system for processing is called-long-term scheduling 54-A set of techniques that allow to execute a program which is not entirely in memory is called-virtual memory 55-SSTF stands for-Shortest-Seek-time-first scheduling 56-Before proceeding with its execution, each process must acquire all the resources it needs is called-hold and wait 57-Virtual memory is-used in all major commercial operating systems 58-Relocation bits used by relocating loader are specified by-Assembler or Translator 59-Resolution of externally defined symbols is performed by-Linker 60-Relocatable programs-can be loaded almost anywhere in memory 61-Page stealing-is taking page frames other working sets 62-The total time to prepare a disk drive mechanism for a block of data to be read from is its-latency plus seek time

63-To avoid race condition, the maximum number of processes that may be simultaneously inside the critical section is-one 64-The memory allocation scheme subject to external fragmentation is-segmentation 65-Page fault frequency in an operating system is reduced when the-locality of reference is applicable to the process 66-In which of the following page replacement policies Baladys anomaly occurs?- FIFO 67-Virtual memory can be implemented with-Segmentation & Paging 68-Recognition of basic syntactic constructs through reductions, this task is performed By-Syntax analysis 69-A grammar for a programming language is a formal description of-Structure 70-Swapping - is a technique of temporarily removing inactive programs from the memory of computer system 71-Ageing-is a technique of improving the priority of process waiting in Queue for CPU allocation 72-Latency Time-is the time required by a sector to reach below read/write head. 73-Which of the following is most general phase structured grammar? Context Sensitive 74-File record length-Should be chosen to match the data characteristics. 75-A public key encryption system-Allows only the correct receiver to decode the data

1 2 3
Important objectives of Computer Architecture

1-An address used by programmers in a system supporting virtual memory concept is called virtual address and the set of such addresses are called address space. 2-The method for updating the main memory as soon as a word is removed from the Cache is called- write-back

3-A control character is sent at the beginning as well as at the end of each block in the synchronous-transmission in order to-Supply information needed to separate the incoming bits into individual character. 4-In a non-vectored interrupt, the address of interrupt service routine is -Assigned to a fixed memory location. 5-Divide overflow is generated when-Sign of the dividend is same as that of divisor. 6-Which method is used for resolving data dependency conflict by the compiler Itself-Delayed load. 7-Stack overflow causes-Internal interrupt. 8-Arithmetic shift left operation-Produces the same result as obtained with logical shift left operation. For Examp-

9-Zero address instruction format is used for-Stack-organized architecture. 10-Address symbol table is generated by the-assembler. 11-The negative numbers in the binary system can be represented by-2's complement 13-ABCD - seven segment decoder / driver in connected to an LED display. Which segments are illuminated for the input code DCBA = 0001. A)b, c 14-How many flip-flops are required to produce a divide-by-32 device? 5 15-The content of a 4-bit register is initially 1101. The register is shifted 2 times to the right with the serial input being 1011101. What is the content of the register after each shift?- 1110, 0111 16-How many different addresses are required by the memory that contain 16K words?16,384 17-What is the bit storage capacity of a ROM with a 512' 4-organization?- 2048

18-DMA interface unit eliminates the need to use CPU registers to transfer data From-Memory to I/O units 19-How many 128 x 8 RAM chips are needed to provide a memory capacity of 2048 bytes?-16 20-Which of the following is a self complementing code?-8421 21-Which gate can be used as anti-coincidence detector?-XOR 22-Which of the following technology can give high speed RAM?- ECL 23-In 8085 microprocessor how many I/O devices can be interfaced in I/O mapped I/O technique?- 256 input devices & 256 output devices. 24-After reset, CPU begins execution of instruction from memory address-0000H 25-Which is true for a typical RISC architecture?- Micro programmed control unit. 26-When an instruction is read from the memory, it is called-Fetch cycle 27-Which activity does not take place during execution cycle?- Branch address is calculated & Branching conditions are checked. 28-A circuit in which connections to both AND and OR arrays can be programmed is calledRAM 29-If a register containing data (11001100)2 is subjected to arithmetic shift left operation, then the content of the register after 'ashl' shall be-(10011000)2 30-Which logic is known as universal logic? NAND logic. 1-An address used by programmers in a system supporting virtual memory concept is called virtual address and the set of such addresses are called address space. 2-The method for updating the main memory as soon as a word is removed from the Cache is called- write-back 3-A control character is sent at the beginning as well as at the end of each block in the synchronous-transmission in order to-Supply information needed to separate the incoming bits into individual character. 4-In a non-vectored interrupt, the address of interrupt service routine is -Assigned to a fixed memory location. 5-Divide overflow is generated when-Sign of the dividend is same as that of divisor. 6-Which method is used for resolving data dependency conflict by the compiler Itself-Delayed load. 7-Stack overflow causes-Internal interrupt. 8-Arithmetic shift left operation-Produces the same result as obtained with logical shift left operation. For Examp-

9-Zero address instruction format is used for-Stack-organized architecture.


10-Address symbol table is generated by the-assembler. 11-The negative numbers in the binary system can be represented by-2's complement 13-ABCD - seven segment decoder / driver in connected to an LED display. Which segments are illuminated for the input code DCBA = 0001. A)b, c 14-How many flip-flops are required to produce a divide-by-32 device? 5 15-The content of a 4-bit register is initially 1101. The register is shifted 2 times to the right with the serial input being 1011101.

What is the content of the register after each shift?- 1110, 0111 16-How many different addresses are required by the memory that contain 16K words?- 16,384 17-What is the bit storage capacity of a ROM with a 512' 4-organization?- 2048 18-DMA interface unit eliminates the need to use CPU registers to transfer data From-Memory to I/O units 19-How many 128 x 8 RAM chips are needed to provide a memory capacity of 2048 bytes?-16 20-Which of the following is a self complementing code?-8421 21-Which gate can be used as anti-coincidence detector?-XOR 22-Which of the following technology can give high speed RAM?- ECL 23-In 8085 microprocessor how many I/O devices can be interfaced in I/O mapped I/O technique?- 256 input devices & 256 output devices. 24-After reset, CPU begins execution of instruction from memory address-0000H 25-Which is true for a typical RISC architecture?- Micro programmed control unit. 26-When an instruction is read from the memory, it is called-Fetch cycle 27-Which activity does not take place during execution cycle?- Branch address is calculated & Branching conditions are checked. 28-A circuit in which connections to both AND and OR arrays can be programmed is called-RAM 29-If a register containing data (11001100)2 is subjected to arithmetic shift left operation, then the content of the register after 'ashl' shall be-(10011000)2 30-Which logic is known as universal logic? NAND logic. 31-The time for which the D-input of a D-FF must not change after the clock is applied is known as-Hold time. 32-How many memory chips of (128 x 8) are needed to provide a memory capacity of 4096 x 16?- 64 33-In addition of two signed numbers, represented in 2' s complement form generates an overflow if-A B 1 34-Addition of (1111)2 to a 4 bit binary number 'a' results:- No change 35-In a microprocessor system, suppose. TRAP, HOLD, RESET Pin got activated at the same time, while the processor was executing some instructions, then it will first respond to-None 36-Pseudo instructions are-Machine instructions 37-An attempt to access a location not owned by a Program is called-Address fault 38-Dynamic RAM consumes _Less_ Power and _Slower_ then the Static RAM. 39-Which flag of the 8085's flag register is not accessible to programmer directly?-- Auxiliary carry flag 40-Cache memory works on the principle of-Locality of reference 41- Which of the following is a Pseudo instruction?- END 42- A demultiplexer can be used as- Decoder 43- Excess-3 equivalent representation of (1234)H is- (4567)Ex-3 44- Which of the memory holds the information when the Power Supply is switched off?- EEROM 45- Minimum no. of NAND gate required to implement a Ex-OR function is- 4 46- Which of the following interrupt is maskable?- RST 7.5 47- Which of the following expression is not equivalent to x?- x NOR 1

48- Word 20 contains 40 Word 30 contains 50 Word 40 contains 60 Word 50 contains 70 Which of the following instructions does not, load 60 into the Accumulator- Load direct 30 49- An interrupt for which hardware automatically transfers the program to a specific memory location is known as- Hardware interrupt 50- Synchronous means _______ At same time 51- 'n' Flip flops will divide the clock frequency by a factor of- n 52- In DMA the data transfer is controlled by- I/O devices 53- The number of instructions needed to add a numbers an store the result in memory using only one address instruction is- Independent of n 54- Negative numbers cannot be represented in- 2's complement form 55- Which of the following architecture is/are not suitable for realizing SIMD- Von Neumann 56- In Boolean expression A+BC equals- (A+B)(A+C) 57- A JK flip-flop can be implemented using D flip-flop connected such that58- An effective solution to the power consumption problem lies in using _______ transistors to implement ICs.- both NMOS & PMOS 59- Memory interleaving technique is used to address the memory modules in order to Have- reduced complexity in mapping hardware 60- In a multiprogramming system, which of the following is used- Paging concept You might also like:

Вам также может понравиться